Tags
Language
Tags
March 2024
Su Mo Tu We Th Fr Sa
25 26 27 28 29 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6

Medieval Hackers

Posted By: lengen
Medieval Hackers

Medieval Hackers by Kathleen E Kennedy
English | Jan. 16, 2015 | ISBN: 0692352465 | 160 Pages | PDF | 3 MB

… the word [“hacker”] itself is quite old. In fact, the earliest record of the noun “hacker” is medieval: a type of chopping implement was known as a “hacker” from the 1480s. Evidently, over time the term moved from the implement to the person wielding the implement. Today the grammatical slippage remains, as “the hacker hacked the hack” is grammatically sound, if stylistically unfortunate. Notably, even in its earliest uses, “hacker” and “hacking” referred to necessary disruption. Arboriculture required careful pruning (with a hacker) to remove unwanted branches and cultivation necessitated the regular breaking up of soil and weeds in between rows of a crop (with a hacker). Such practices broke limbs and turf in order to create beneficial new growth. Such physical hacking resembles the actions of computer hackers who claim to identify security exploits (breaking into software) in order to improve computer security, not to weaken it. ~Kathleen E. Kenndy, Medieval Hackers Medieval Hackers calls attention to the use of certain vocabulary terms in the Middle Ages and today: commonness, openness, and freedom. Today we associate this language with computer hackers, some of whom believe that information, from literature to the code that makes up computer programs, should be much more accessible to the general public than it is. In the medieval past these same terms were used by translators of censored texts, including the bible. Only at times in history when texts of enormous cultural importance were kept out of circulation, including our own time, does this vocabulary emerge. Using sources from Anonymous’s Fawkes mask to William Tyndale’s bible prefaces, Medieval Hackers demonstrates why we should watch for this language when it turns up in our media today. This is important work in media archaeology, for as Kennedy writes in this book, the “effluorescence of intellectual piracy” in our current moment of political and technological revolutions “cannot help but draw us to look back and see that the enforcement of intellectual property in the face of traditional information culture has occurred before. … We have seen that despite the radically different stakes involved, in the late Middle Ages, law texts traced the same trajectory as religious texts. In the end, perhaps religious texts serve as cultural bellwethers for the health of the information commons in all areas. As unlikely as it might seem, we might consider seriously the import of an animatronic [John] Wyclif, gesturing us to follow him on a (potentially doomed) quest to preserve the information commons.”